首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
Biometric borders: Governing mobilities in the war on terror   总被引:1,自引:0,他引:1  
《Political Geography》2006,25(3):336-351
This article proposes the concept of the biometric border in order to signal a dual-faced phenomenon in the contemporary war on terror: the turn to scientific technologies and managerial expertise in the politics of border management; and the exercise of biopower such that the bodies of migrants and travellers themselves become sites of multiple encoded boundaries. Drawing on the US VISIT programme of border controls (United States Visitor and Immigrant Status Indicator Technology), the article proposes three central themes of the politics of the biometric border. First, the use of risk profiling as a means of governing mobility within the war on terror, segregating ‘legitimate’ mobilities such as leisure and business, from ‘illegitimate’ mobilities such as terrorism and illegal immigration. Second, the representation of biometrics and the body, such that identity is assumed to be anchored as a source of prediction and prevention. Finally, the techniques of authorization that allow the surveillance of mobility to be practiced by private security firms and homeland security citizens alike. Throughout the article, I argue that, though the biometric border is becoming an almost ubiquitous frontier in the war on terror, it also contains ambivalent, antagonistic and undecidable moments that make it contestable.  相似文献   

2.
Mathematical models could be helpful in assisting the Indian government's new initiative of issuing biometric cards to its citizens. This note examines the role of mathematical models in estimating the missing, non-enumerated population numbers, and in estimating the number of cards required by age, gender and regions annually in India. The link between the National Population Register and biometric cards is also highlighted. There are other scientific issues, such as electronic security, data storage management and identity verification, which we do not model in this paper, though we address the role they play in successful implementation.  相似文献   

3.
Many US public schools, struggling with perceived issues of safety and security, have installed a host of different biometric devices – vein scanners, automated fingerprint identification systems, iris scanners, GPS-enabled identification badges, and facial recognition software. Schools turn to these devices in hopes of securing school space by sorting and tracking students, visitors, and school staff based on their pre-determined risk profiles. As such, this article proposes that tracing these new forms of school security provides insight into how the politics and practices of biometric technologies are fundamentally geographical in nature. That is, biometric devices not only verify identity according to risk assessments, they also work to manage mobility by regulating where school bodies can go, when, and for what purposes. Moreover, this article analyzes how these risk profiling tactics, widely adopted by schools across the United States, necessarily borrow from the strategies used in sites of colonial occupation. Looking at schools in this way can help us plot how biometric bordering and resultant security decisions unfold at other sites of mobility beyond state (smart) borders, highways, toll booths, and ports of entry in order to formulate new “spaces of enclosure” (Amoore, Marmura, & Salter, 2008) and “dividing practices” (Nevins, 2002), thus bringing students into “closer proximity” to military relations of force through these “war-like architectures” (Amoore, 2009).  相似文献   

4.
Using Slavic examples, the article looks at the nationalism/security nexus present today between the birth of ethnicities (early middle ages) and the birth of nationalism (eighteenth century). I discuss how Slavic ethnicity emerged in Greek and Roman security thinking. Others were classified in terms of ethnoi and were then interpellated into this self‐understanding. If ethnicity is an identity for the Other, then nationalism is an identity for the Self. It becomes a security concern not to order the Other polity's identity, as did the Byzantines, but to see to it that groups that may threaten your own nationalism – minorities, imperial subjects – cannot embrace nationalism. The policy of denying nationhood to minorities must be understood amongst other things as security policy. The organic understanding of the nation as young and vital demonstrates a third interstice between security and nationalism. If the young and vital nation is to grow and expand at the expense of the old and tired, then the polity that represents itself as a young and vital nation is by dint of that representation alone a security threat against those that they represent as old and tired. Finally, I discuss how this theme is played out in today's Russia  相似文献   

5.
Biometric identity registration technologies are spreading throughout the world. Developing countries in particular, have recently been seen to construct biometric population registers in partnership with international donor organizations. This article traces the temporal entanglements produced by transnational policy mobilities in the inception and implementation of Ghana's national biometric identity registration project. In 2008, Ghana famously introduced the first biometric banking system in Africa. Yet, the e‐zwich payment system marked only the first step towards the current ‘craze’ for biometric identity registration in the West African country. Among the numerous biometric identity documents circulating in Ghana's national and subnational institutions, the national Ghanacard is the most interesting identity registration project in the country, both in terms of its population‐wide reach and the complex constellation of institutions, actors and ideas competing within the project. With a focus on the temporalities of policymaking, the article examines the project's fundamental future orientation, the temporal context of its production with its specific possibilities of imagining and acting upon certain matters, and the rhythms and schedules of project implementation. By doing so, it draws attention to some of the ways in which competing sets of ideas shape large‐scale investments in technology and infrastructure in Africa.  相似文献   

6.
Louise Amoore 《对极》2009,41(1):49-69
Abstract:  Technologies that deploy algorithmic calculation are becoming ubiquitous to the homeland securitization of the war on terror. From the surveillance networks of the city subway to the biometric identifiers of new forms of border control, the possibility to identify "association rules" between people, places, objects and events has brought the logic of pre-emption into the most mundane and prosaic spaces. Yet, it is not the case that the turn to algorithmic calculation simply militarizes society, nor even that we are witnessing strictly a commercialization of security. Rather, algorithmic war is one form of Foucault's sense of a "continuation of war by other means", where the war-like architectures of self/other, here/there, safe/risky, normal/suspicious are played out in the politics of daily life. This paper explores the situated interplay of algorithmic practices across commercial, security, and military spheres, revealing the violent geographies that are concealed in the glossy techno-science of algorithmic calculation.  相似文献   

7.
In 2003, the Bloomberg administration launched Operation Impact, a hot-spots policing program which identified high-crime areas in New York City and flooded them with high concentrations of new police officers. These hot-spots, labeled Impact Zones, are sites of mobility constrained and structured by biometric and spatial technologies borrowed from the military. This article analyzes the city's advanced police profiling technologies as they play out within Impact Zones. The profiling is racial, social, biometric, bio-political, and spatial, and works to demarcate dangerous people and places. Because this profiling technology is enacted spatially and governs residents' mobility, I argue for a new conceptual apparatus, which I call bio-spatial profiling. Drawing on ethnographic fieldwork in police hot-spots, policy analysis, and textual analysis of media articles, I argue that the lived experience of biospatial profiling is one of pervasive fear which governs mobilities in Impact Zones. Next, I trace the experiences of Northeast Brooklyn residents back to their sources, and find three bio-spatial practices: both biometric and spatial data collection, and police street-stops. These symbiotic practices inform and strengthen each other, congealing to produce fear and immobility for those they target. The article concludes with a discussion of the conflicting understandings of (in)security in Impact Zones that connects the practices with the experiences of bio-spatial profiling, to illuminate the human costs of militarized securitization of domestic urban life.  相似文献   

8.
9.
Most international relations (IR) research on the role of collective memory and representations of the past gives the impression that these primarily matter for states constrained internationally by their history as aggressors, such as Japan. How former perpetrator states represent the past is seen as important for bilateral relations because it may affect perceptions in previously victimised states. Representations of the past in the victimised states are seldom dealt with. This article argues that war memory in victimised states is also highly relevant for bilateral relations, since it is closely connected to “ontological security”, or the “security of identity”. By analysing Chinese official documents and Japanese parliamentary debates the article shows how the Chinese government has used representations of the past for ontological security purposes, and how in response Japanese political actors have politicised exhibits at Chinese war museums that are seen as a threat to Japanese identity and interests.  相似文献   

10.
Based on research with millennial women in Canada, this article examines the process of workplace identity, or (un)conscious strategies of identity management that young women employ at work. First, despite increasing labour market participation from women, young women’s experience of the workplace can be one of precarity and insecurity. Many millennial women have responded with a ‘positive front’ – saying yes to all work tasks while highlighting their likability and acceptance of the status quo. This is not seen as a permanent strategy, but rather one that gets you into the workplace and ‘liked’ until your work speaks for itself. Second, and operating at the same time, young women also use tactics to confront intersections of ageism/sexism in the workplace. While some employ conscious strategies to be ‘taken seriously’ through dress, small talk, even taking on stereotypical traits of masculinity to be recognized as competent, others explicitly confront inequality through ‘girlie feminism’ with a pro-femininity work identity that challenges the masculine-coded norms of how a successful workplace operates and what it looks like. In jobs of all types, who we are at work is a constantly shifting negotiation between how we are treated and seen by others, the workplace as a social space, our past experiences and our own expectations. Considering young women’s work identities reveals how power and privilege operate in the workplace, and the possibilities of young women’s agential challenges to inequitable workplace norms and a precarious labour market.  相似文献   

11.
Greater diversity in life courses has become both possible and real in the twenty-first century, affecting the relocation behaviours of individuals. Therefore, it is logical that the relocation patterns of minorities have been receiving increasing attention. In particular, the migration patterns of gay men have been studied, with a focus on the embodied reasons for mobility. This downsized analysis has shown the importance of identity building and identity search. However, this article argues that analysis of migration among gay men also needs to be upsized. This study aims to show how both context and embodiment has affected the mobility of gay men. Through a case study within the context of a strong welfare state (Sweden) that adopted sexual equality early, gay men’s motives for migration are studied. The results suggest that the migration patterns of gay men are becoming more similar to those of the general population. This finding shows that current conceptualisations of the migration patterns of gay men can be advanced by acknowledging contextual effects. The integration of a downsized and an upsized understanding also offers the possibility of moving beyond the identity specifics showing that populations are becoming increasingly diverse and homogeneous simultaneously.  相似文献   

12.
ABSTRACT

This paper explores the scope for understanding postcolonial and hybrid identities through the theory of ontological security in International Relations. It examines the circulation of identity for a dispersed postcolonial population, namely Cypriots. This circulation happens amongst a deterritorialised public, through media and movement of people. It carries meaning that is formative of the identity of the diaspora and of the identity of the home state, implicating both in a complex and relational ontological security comprising identity, memory, state and society. The Green Line dividing North from South in Cyprus represents the bifurcation of the island, rupturing the possibility of a territorially unified Cypriot identity. The line also represents a rupturing of contiguous ethnic identities, marking the creation of refugee populations and Cypriot diasporas. The Green Line is both a physical location and circulating symbol of ontological insecurity. On one hand, the Green Line marks the creation of Cypriot refugees and diasporas. On the other, it marks a gateway to Europe for asylum seekers attempting to enter the Southern part of the island. I theorise the Green Line as an emblem of ontological insecurity whose meaning is (re)constituted in the lived experience of Cypriot diaspora and migrants seeking security, revealing a hybrid and fluid identity.  相似文献   

13.
Cultural festivals and events are increasingly becoming arenas of discourse enabling people to express their views on wider cultural, social and political issues. Often the debates polarise into those advocating change and those wishing to preserve “traditional” or “local” culture in the face of modernisation and globalisation. This article analyses the discourse on cultural festivals from the perspective of stakeholders involved in traditional and popular culture events in Catalunya. There is generally a high level of agreement about the aims of cultural events and the cultural content that is appropriate for them. In particular, the importance of cultural events in underpinning Catalan identity is seen as being important. However, stakeholders tend to differ more in the meanings attached to concepts such as identity, with policy makers exhibiting a greater emphasis on economic and political issues, whereas cultural producers are more concerned with social aspects of identity. However, the general consensus on the social role of cultural events between the different stakeholders may be one explanation for the relatively vibrant festival culture in Catalunya.  相似文献   

14.
While the use of public policy to construct a Canadian identity has been established in the literature, what is less well understood is whether national identity, once established, might shape Canadians' feelings about these same public policies. This article examines the extent to which citizens' national identities influence their pride in Canada's social security system, and how this relationship may be changing over time. Using data from the International Social Science Programme's 1995 and 2003 National Identity Modules, the article argues that citizens' national identities help explain the contours of social security attitudes in Canada, and that this relationship persists despite significant policy change in the field. Additionally, the paper suggests that political actors may successfully increase public support for their social security policies by “framing” them in ways that appeal to citizens' definitions of Canada.  相似文献   

15.
ABSTRACT. The relationship between national identity and how people perceive and consume media is a central but largely untested assumption of studies of nationalism. Using a previously developed classification of identity among English migrants to Scotland, this paper explores associations between how people use the media and how they make sense of their national identity. Compared with Scottish nationals, who tend to adopt a more taken‐for‐granted and uncontentious view of the media, except when they feel that the media presented to them challenge their sense of identity, English migrants find that the agendas of the media in Scotland differ from those they are used to south of the border. Specifically, how they view the media tends to vary according to whether they view themselves as ‘English’, ‘British’ or as ‘becoming Scottish’.  相似文献   

16.
Both the form of a stone tool and the anatomy of the individual using it have potential to influence its cutting performance. To date, however, the selective pressures acting on stone‐tool form and hominin biometric/biomechanical attributes have been investigated in isolation and their relative influence on performance have never been compared directly. This paper examines the influence of both tool‐form attributes and biometric variation on the functional performance of Acheulean handaxes. Specifically, it investigates the impact of 13 tool attributes and eight biometric traits on the working forces applied through the edge of 457 replica tools. The relative contribution of tool‐form and biometric attributes to handaxe loading levels were examined statistically. Results identify that both tool‐form attributes and biometric traits are significantly related to loading; however, tool–user biometric variation has a substantially greater impact relative to tool‐form attributes. This difference was demonstrated by up to a factor of 10. These results bear directly on the co‐evolutionary relationships of stone tools and hominin anatomy, and the comparative strength of selective pressure acting on each. They also underline why handaxe forms may have been free to vary in form across time and space without necessarily incurring critical impacts on their functional capabilities.  相似文献   

17.
In Sri Lanka, gender and national identities intersect to shape people's mobility and security in the context of conflict. This article aims to illustrate the gendered processes of identity construction in the context of competing militarised nationalisms. We contend that a feminist approach is crucial, and that gender analysis alone is insufficient. Gender cannot be considered analytically independent from nationalism or ethno‐national identities because competing Tamil and Sinhala nationalist discourses produce particular gender identities and relations. Fraught and cross‐cutting relations of gender, nation, class and location shape people's movement, safety and potential for displacement. In the conflict‐ridden areas of Sri Lanka's North and East during 1999–2000, we set out to examine relations of gender and nation within the context of conflict. Our specific aim in this article is to analyse the ways in which certain identities are performed, on one hand, and subverted through premeditated performances of national identity on the other hand. We examine these processes at three sites—shrines, roads and people's bodies. Each is a strategic site of security/insecurity, depending on one's gender and ethno‐national identity, as well as geographical location.  相似文献   

18.
Russia has tried to use economic incentives and shared historical and cultural legacies to entice post-Soviet states to join its regional integration efforts. The Ukraine crisis exposed the weaknesses of this strategy, forcing Russia to fall back on coercive means to keep Kiev from moving closer to the West. Having realized the limits of its economic and soft power, will Russia now try to coerce post-Soviet states back into its sphere of influence? Fears of such an outcome overestimate Russia’s ability to use coercion and underestimate post-Soviet states capacity to resist. Rather than emerging as a regional bully, Russia is trying to push Eurasian integration forward by becoming a regional security provider. The article relates these efforts to the larger literature on regional integration and security hierarchies – bridging the two bodies of theory by arguing that regional leaders can use the provision of security to promote economic integration. Despite initial signs of success, we believe that the new strategy will ultimately fail. Eurasian integration will continue to stagnate as long as Russia’s economic and soft power remain weak because Russia will be unable to address the economic and social problems that are at the root of the region’s security problems.  相似文献   

19.
陆邵明 《人文地理》2013,28(3):51-57
论文综述了国内外关于场所的相关理论研究,提出了一种城市文化特色塑造的基础性的新方法"场所叙事"。论文阐述了相关的定义与内容,探索了城市文化特色与其认同性建构的场所叙事策略与路径。相比传统基于物质形象塑造模式,场所叙事更倾向于将场所中隐含的非物质的社会文化信息展现到物质空间之中,来凸显城市亚文化;同时,场所叙事提供了一种跨学科的框架来建构文化认同,培育场所与人之间的和谐关系。此外,论文对上海滨水历史街区"老码头"更新进行考查,从场所叙事角度,来诠释与验证其策略在历史街区重构中的适用性。本文的贡献在于为当下中国城镇化进程中塑造城市地域文化特色提供了新思路。  相似文献   

20.
This study explores the link between religious identity and conflict in contemporary Turkey by examining the dramatic reversals in the relations between the country’s two prominent Islamic social forces, the ruling party AKP and the Gülen Organization. It shows how a particular trajectory of power and identity between the two religious forces transformed into a brutal security competition in the Turkish society and polity. It puts the analytical foci on the following puzzle: how did the Gülen community — once a confidential ally of AKP — turn into a coup plotter in the Turkish military to bring down the elected government? In order to explore the puzzle, the study offers significant departures from the standard approaches to religious identity and conflict by employing a distinct concept — the inter‐societal security dilemma.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号